1 / 12

DEVELOPING THE SECURITY SYSTEM

DEVELOPING THE SECURITY SYSTEM. RISK ANALYSIS. Objects. FIELD SURVEY. GATHERING INFORMATION. Adversary. EVALUATION. Environment. SYSTEM DEVELOPMENT. Steps required in order to develop a comprehensive security system. IMPLEMENTATION SUPERVISION. ON GOING SUPPORT.

salma
Download Presentation

DEVELOPING THE SECURITY SYSTEM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DEVELOPING THE SECURITY SYSTEM RISK ANALYSIS Objects FIELD SURVEY GATHERING INFORMATION Adversary EVALUATION Environment SYSTEM DEVELOPMENT Steps required in order to develop a comprehensive security system IMPLEMENTATION SUPERVISION ON GOING SUPPORT

  2. APPROCH & CONCEPT 1. Concentration of Efforts 2. Optimal balance of security elements 3. Elements of Deterrence 4. Creation of “Security Circles” 5. Attention to cost versus benefit

  3. Gathering information Personal Technical And Physical means Procedures Quality assurance INTEGRATEDSECURITY SYSTEM

  4. Gathering information Personal Technical And Physical means Procedures Quality assurance INTEGRATEDSECURITY SYSTEM Reflects the optimal balance between the five basic elements of security

  5. INTEGRATEDSECURITY SYSTEM Click on mouse to advance to next slide • Gathering Information –Is a basic task that enables us to provide a suitable security concept and system that will optimally answer our client’s needs. • Technical Means –Equipment and systems are constantly being upgraded and developed. We aspire to use state-of-the-art equipment and systems in order to ensure that our client’s system will last for many years. In other words, the more sophisticated the system that we will provide, the less future investment will be required. • Personnel –A good system without skilled people to operate and to maintain it will not accomplish the tasks for which it was designed. We will ensure training our client staff. • Procedures –A good system without usage procedures, guidelines and rules for the employees will defeat the purpose for which the system was designed. We will develop those procedures. • Quality Assurance –Ensuring that all elements of the system are working together as one system is a fundamental issue.

  6. INTEGRATEDSECURITY SYSTEM The Optimal Security System Click on mouse to advance to next slide • The ultimate security system will include all five elements. Our main target is to achieve an optimal balance between those five elements. This achievement ensures that our client will obtain the most effective system for his money. • Our idea is to achieve this balance specifically in relation to the cost. Thus, our client will acquire the most effective system for his output.

  7. Controls, Supervision, Drills Technical means Procedures Personal SECURITY CIRCLES Creating security circles with the mentioned security elements around the facility

  8. SECURITY CIRCLES will eliminate getting to and penetrating the core of facility AND Adversary

  9. SECURITY CIRCLES SISCunique Expertise and Experience Leading to capture or retreat! Adversary

  10. SISC, The Security ExpertSample of system’s expertise • Security Control Command Center • Perimeter and Site Systems • Border surveillance and Passages Control • CCTV (Close Circuit TV) Systems • Thermal & Radar Imaging and Detection • Access Control Systems: • LPR (License Plate Recognition) • Hand and finger Biometric identification • Face recognition • Smart Card • Communication and Public Address systems • Non Conventional Treats • Network Data Communication Systems

  11. SISC, The Security ExpertSpecial Perimeter Expertise • Developed unique experience in perimeter protection systems • Designing and supervising perimeter security concept • Using state of the art systems and devices • Supervision of over 450 km of perimeter security system installations (led by IDF) • Designing perimeter system of the Olympic Village, Athens 2004 • System included electronic fence detection system integrated with CCTV cameras system

  12. SISC, The Security ExpertSpecial Perimeter Expertise End of slide show Please click here with Your mouse here to end • Developing the security concept of army camps, air force bases, towns, villages and settlements • Systems used were electronic perimeter fence detection systems & Electrical Shocking fencing systems • Special perimeter systems using long-range detection systems such as: • Thermal detection systems • Radar systems • Video Motion Detection (VMD) systems • Acoustic detection systems • Seismic systems • Borders Passages & Entrances to facilities – LPR, Biometric, Smart card systems, etc. • All systems were integrated and managed by integrated Command & Control security management system and supported by CCTV (Closed Circuit TV) for verifications

More Related